Across the entire migration project, Good Professional Services has developed many best practice recommendations as a result of their rich experience. Listed in this white paper are 10 recommendations that cut across people, processes, and technology for IT to consider when planning migration projects. Read More...

Now that many organizations are on board with the basics of business mobility, users are hungry for more. Companies everywhere are turning to mobile business apps to empower employees on the go and kickstart productivity. But as these organizations move beyond Mobile Device Management (MDM), IT must ensure that the...

Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how...

With enhanced mobility and work flexibility comes increased information security risk. Explore the security implications and capabilities of the major mobile OS platforms and learn more about best practices to fortify security while supporting new levels of productivity.

Choose your preferred IDE and develop apps with ease for mobile and client devices. Intel® Integrated Native Developer Experience (Intel® INDE) is a comprehensive set of tools and libraries to build, analyze, and debug Android and Windows apps. Now, you can quickly and easily create applications with native performance and...

A recent IDG survey of CIOs revealed that those using virtual desktops now say the biggest benefits are increased simplicity and a more productive and mobile workforce. Find out how other companies are using virtual desktops to: Drastically cut IT investment costs Simplify management across multiple platforms...

Mobile file sharing has become a necessity for today’s enterprises–nearly all workers are mobile. To stay productive, workers need access to all their files on all their devices. They also need to share files selectively and securely with other employees, partners, customers, and other users outside the enterprise. To protect...

The typical mobile worker is carrying three or more mobile devices, at least one of which is a personal device brought from home. Organizations need to protect their data on every mobile device it resides. Unfortunately, enterprise mobile security falls short much of the time. Read this whitepaper to learn...

This report provides the key findings taken from a survey conducted by AIIM (an advocate and supporter of information professionals) between June and July 2013. Learn how important mobile access is to users, how likely they are to by-pass authorized systems, how compliant current collaboration practices are, and what collaboration...

How can IT keep up with the ever-expanding universe of mobility? Enter Enterprise Mobility Management (EMM), which encompasses all aspects of mobility that IT must secure and manage. Download this white paper to learn: How the demand for mobile security has changed What organizations of all sizes must do to...

Do You Know the Policies to Protect Enterprise Mobility? Managing smartphones and tablets is only half the MDM story. Securing the data and access points between corporate systems and your workers' iOS, Android, Windows, and BlackBerry devices requires just as much consideration and planning as protecting the devices themselves. This...

Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing email, apps and content without compromising user experience. Not all mobile security and management solutions are built alike, "Mobile Data Security: Finding the Balance" explores...

Learn how you can implement secure mobile access in a controlled, step-by-step manner, so you can allow your increasingly mobile workforce to become more productive and still ensure the security of your corporate data and resources.

With Workday, business systems can be quickly configured to fit the business—meaning the configuration happens without the need for programmers, professional services, or consultants. In this paper, we examine the high cost of making and supporting customizations to client/server-based applications as well as the differences between configuration and customization.

For the past 4 years, the e-tailing group has strived to be in the forefront of mobile by adapting their industry respected mystery shopping to the mobile channel. Objectives for the 2013 survey were to assess the year-over-year trends, highlight top mobile retailers and key in on best practices. Retailers...

A modern mobile IT strategy is no longer an option, it is an absolute business necessity. Today’s most productive employees are not tied to a desk, an office, or a location. They are mobile. And your company’s IT strategy has to be ready to support them with easy, reliable,...

Testing mobile applications is a messy and complex business. The chaos stems from three distinct areas, beginning with an increasing number of multiple mobile Operating Systems (OSs) and device types in the enterprise. For IT and Quality Assurance (QA) teams, this means mobile applications must be developed, tested, deployed and...

This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile...

IBM Software for System z delivers the security, systems connectivity, and development capabilities to meet tough enterprise mobile requirements. Mobile is huge. The use of mobile devices and apps is pervasive in our everyday lives - on average, mobile users check their devices 30 times per hour. And with...

This fact sheet outlines the features and benefits of HP’s new unified wired and wireless enterprise solution that delivers industry-leading scalability, reliability and throughput for large enterprise campuses.

With a new operating system, two new phones and a rebranding, BlackBerry is starting 2013 afresh. The company formerly known as Research In Motion or RIM introduced its BlackBerry 10 platform, with chief executive Thorsten Heins marking the day as the “starting line” for a new wave of BlackBerry products....

A silicon valley startup with focus on mobile retail consumer products, company wants to build a mobile a la carte ordering system for a major fast food chain in US. Their challenges are they need food menu a dynamic and fast-changing part of restaurant operations, customer should get close to...

Integrating mobility into business processes holds enormous potential to revolutionize the way businesses operate. Collaboration, both internally and externally can drive efficiencies, speed workflow, and transform customer interactions. Organizations will need trusted partners with both the tools and the understanding to effect these changes while ensuring that they are implemented...

This paper presents the overview of the Android platform towards software development for mobile and non-mobile applications. Android platform includes the popular open source SQLite database which has been used with great success as on-disk file format that allows the developer to handle data in a simple way, but also...

Augmented Reality (AR) is a view of a real-world mixed with and/or superimposed by virtual objects. Therefore, one of the most important key techniques of implementing an AR is recognizing the environment so that it can correctly determine the virtual objects to be displayed on the multimedia representing the real-world....

Many businesses are turning to mobile device management (MDM) solutions to better secure, manage, and support the variety of mobile devices their employees use. In many instances, MDM alone is not enough to protect against data loss and leakage. This paper introduces Good for Enterprise - and its unique approach...

Do more with less through a web-based healthcare portal. HP enables you to service constituents through self-service capabilities that enable more efficient access to, and more effective use of, relevant information. Learn more in the following paper.

The paper presents a hybrid Particle Swarm Optimization (PSO) technique for optimally clustering N palm-print data points into K cluster. The cluster center is automatically detected by PSO technique from a set of features obtained by applying geometrical methods to the palm-print data. The image captured by a peg-free scanner,...

Over time, using a smart-phone touch screen becomes second nature, to the point where one can even do some tasks without looking. Researchers in Germany are now working on a system that would let one perform such actions without even holding the phone - instead one would tap one's palm,...

The performance analysis and measurement of smart phones is becoming a hot research topic in mobile computing research society. In this paper, major evaluation parameters and metrics for different performance aspects (hardware, additional modules, software, system and usage) of the smart phone design are introduced, and some latest development of...

The speaker of this podcast talks about Microsoft Silverlight, Rich Internet Application (RIA), Windows Phone and Touch Interfaces. The speaker of this podcast explores what's compelling and cool about the tools and technologies that developers need to do their jobs.

If your organization is planning its mobile device strategy and Windows Phone 7 is an option, you'll want to take these factors into account.
This download is also available as an entry in our 10 Things blog.

Mobile file sharing has become a necessity for today’s enterprises–nearly all workers are mobile. To stay productive, workers need access to all their files on all their devices. They also need to share files selectively and securely with other employees, partners, customers, and other users outside the enterprise. To protect...

The typical mobile worker is carrying three or more mobile devices, at least one of which is a personal device brought from home. Organizations need to protect their data on every mobile device it resides. Unfortunately, enterprise mobile security falls short much of the time. Read this whitepaper to learn...

This report provides the key findings taken from a survey conducted by AIIM (an advocate and supporter of information professionals) between June and July 2013. Learn how important mobile access is to users, how likely they are to by-pass authorized systems, how compliant current collaboration practices are, and what collaboration...

A recent IDG survey of CIOs revealed that those using virtual desktops now say the biggest benefits are increased simplicity and a more productive and mobile workforce. Find out how other companies are using virtual desktops to: Drastically cut IT investment costs Simplify management across multiple platforms...

With enhanced mobility and work flexibility comes increased information security risk. Explore the security implications and capabilities of the major mobile OS platforms and learn more about best practices to fortify security while supporting new levels of productivity.

Choose your preferred IDE and develop apps with ease for mobile and client devices. Intel® Integrated Native Developer Experience (Intel® INDE) is a comprehensive set of tools and libraries to build, analyze, and debug Android and Windows apps. Now, you can quickly and easily create applications with native performance and...

Across the entire migration project, Good Professional Services has developed many best practice recommendations as a result of their rich experience. Listed in this white paper are 10 recommendations that cut across people, processes, and technology for IT to consider when planning migration projects. Read More...

Now that many organizations are on board with the basics of business mobility, users are hungry for more. Companies everywhere are turning to mobile business apps to empower employees on the go and kickstart productivity. But as these organizations move beyond Mobile Device Management (MDM), IT must ensure that the...

Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how...

Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing email, apps and content without compromising user experience. Not all mobile security and management solutions are built alike, "Mobile Data Security: Finding the Balance" explores...

This report presents an algorithm for accurate recognition of text on a business card, given an Android mobile phone camera image of the card in varying environmental conditions. First a MATLAB implementation of the algorithm is described where the main objective is to optimize the image for input to the...

Over time, using a smart-phone touch screen becomes second nature, to the point where one can even do some tasks without looking. Researchers in Germany are now working on a system that would let one perform such actions without even holding the phone - instead one would tap one's palm,...

As with most phone OSes, Windows Phone 7 has some good features as well as a few shortcomings. Deb Shinder takes a look at the pros and cons.This download is also available as an entry in our 10 Things blog.

With the rise of Android, the reboot of BlackBerry, and the redesigned iPhone, 2010 can rightly be called the year of the smartphone.This download is also available as an entry in our 10 Things blog and as a TechRepublic slideshow.

If your organization is planning its mobile device strategy and Windows Phone 7 is an option, you'll want to take these factors into account.
This download is also available as an entry in our 10 Things blog.

One seemingly strange behavior that Windows CE devices (including Pocket PC, Smartphone and Windows Mobile devices) exhibit is that when the query the device time, the get back either a zero of some constant but invalid value for the milliseconds field. This is true whether the call GetLocalTime or GetSystemTime...

Smartphones are widely used today and their popularity will certainly not slow down in the near future due to improved functionality and new technology improvements. Becoming more and more similar to PCs and laptops, they will also begin to face the same security problems especially in terms of network security....

This paper provides an overview of Smartphone platforms standards and a discussion on development efforts and the future of open standards. Mobile phones are emerging from mere communicative devices to a software-intensive devices like PCs and almost every manufacturer have stepped up to focus on creating more innovative mobile operating...

Digital Certificates and public/private key technology is core to Windows Mobile platform security. In this podcast, people can learn how certificates are used to provide authentication, access control and encryption for the OS, applications and networking.

This paper aims at presenting the real and complete structure of the Symbian S60 v3 (third edition) platform file system, which is considered one of the most secure and armored systems issued by Symbian Ltd. in the last two years. By analyzing the unique features of security, which have been...

For the past 4 years, the e-tailing group has strived to be in the forefront of mobile by adapting their industry respected mystery shopping to the mobile channel. Objectives for the 2013 survey were to assess the year-over-year trends, highlight top mobile retailers and key in on best practices. Retailers...

Augmented Reality (AR) is a view of a real-world mixed with and/or superimposed by virtual objects. Therefore, one of the most important key techniques of implementing an AR is recognizing the environment so that it can correctly determine the virtual objects to be displayed on the multimedia representing the real-world....

This paper presents the overview of the Android platform towards software development for mobile and non-mobile applications. Android platform includes the popular open source SQLite database which has been used with great success as on-disk file format that allows the developer to handle data in a simple way, but also...

Integrating mobility into business processes holds enormous potential to revolutionize the way businesses operate. Collaboration, both internally and externally can drive efficiencies, speed workflow, and transform customer interactions. Organizations will need trusted partners with both the tools and the understanding to effect these changes while ensuring that they are implemented...

Many businesses are turning to mobile device management (MDM) solutions to better secure, manage, and support the variety of mobile devices their employees use. In many instances, MDM alone is not enough to protect against data loss and leakage. This paper introduces Good for Enterprise - and its unique approach...

With the growing importance of personal identification and authentication in today's highly advanced world where most business and personal tasks are being replaced by electronic means, the need for a technology that is able to uniquely identify an individual and has high fraud resistance see the rise of biometric technologies....

With the introduction of Apple's iOS and Google's Android operating systems, the sales of smartphones have exploded. These smartphones have become powerful devices that are basically miniature versions of personal computers. However, the growing popularity and sophistication of smartphones have also increased concerns about the privacy of users who operate...

Mobile consumer-electronics devices, especially phones, are powered from batteries which are limited in size and therefore capacity. This implies that managing energy well is paramount in such devices. Good energy management requires a good understanding of where and how the energy is used. To this end the authors present a...

This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile...

Touch screens are an increasingly common feature on personal computing devices, especially smartphones, where size and user interface advantages accrue from consolidating multiple hardware components (keyboard, number pad, etc.) into a single software definable user interface. Oily residues, or smudges, on the touch screen surface, are one side effect of...

This paper describes a system of programs intended to be used for rapid development of applications that can be executed on handheld computers with Palm operating system. The project has two major components: a compiler for a subset of Object Pascal language that generates virtual object code and virtual machines...

The mega trend of the marketplace is mobility. Corporate workers are demanding right-now, anywhere access to information that helps them be more productive. The ClearPath ePortal solution delivers on this demand by providing the capability to rapidly extend existing ClearPath applications to mobile workers securely. This technical webcast will demonstrate...

IBM Software for System z delivers the security, systems connectivity, and development capabilities to meet tough enterprise mobile requirements. Mobile is huge. The use of mobile devices and apps is pervasive in our everyday lives - on average, mobile users check their devices 30 times per hour. And with...

The wind power industry is booming, driven by global demand for clean, renewable sources of energy. AREVA Multibrid GmbH, a leader in wind power plants, has teamed with Beckhoff, a leader in embedded industrial automation, to solve many of the reliability issues associated with generating wind power at sea. An...

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?